Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry
نویسندگان
چکیده
We present a new construction of a compression function H : {0, 1} → {0, 1} that uses two parallel calls to an ideal primitive (an ideal blockcipher or a public random function) from 2n to n bits. This is similar to the well-known MDC-2 or the recently proposed MJH by Lee and Stam (CT-RSA’11). However, unlike these constructions, we show already in the compression function that an adversary limited (asymptotically in n) to O(22n(1−δ)/3) queries (for any δ > 0) has disappearing advantage to find collisions. A key component of our construction is the use of the Szemerédi–Trotter theorem over finite fields to bound the number of full compression function evaluations an adversary can make, in terms of the number of queries to the underlying primitives. Moveover, for the security proof we rely on a new abstraction that refines and strenghtens existing techniques. We believe that this framework elucidates existing proofs and we consider it of independent interest.
منابع مشابه
Electronic Transmission Wave Function of Disordered Graphene by Direct Method and Green's Function Method
We describe how to obtain electronic transport properties of disordered graphene, including the tight binding model and nearest neighbor hopping. We present a new method for computing, electronic transport wave function and Greens function of the disordered Graphene. In this method, based on the small rectangular approximation, break up the potential barriers in to small parts. Then using the f...
متن کاملCryptanalysis of the LAKE Hash Family
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity...
متن کاملImplementation of VlSI Based Image Compression Approach on Reconfigurable Computing System - A Survey
Image data require huge amounts of disk space and large bandwidths for transmission. Hence, imagecompression is necessary to reduce the amount of data required to represent a digital image. Thereforean efficient technique for image compression is highly pushed to demand. Although, lots of compressiontechniques are available, but the technique which is faster, memory efficient and simple, surely...
متن کاملتوسعه مدل شبکه -دانه مجزای بتن برای سنگدانههای غیردایروی
In this paper, Lattice-Discrete Particle Model (LDPM) of concrete has been extended in 2-D to account for the effect of non-circular aggregates. To this end, the flexible equation of super-ellipse is employed for generating aggregates in order to add the simulation possibility of a greater spectrum of aggregate samples in 2-D to lattice-Discrete particle Model. Alongside this extention, require...
متن کامل3D Models Recognition in Fourier Domain Using Compression of the Spherical Mesh up to the Models Surface
Representing 3D models in diverse fields have automatically paved the way of storing, indexing, classifying, and retrieving 3D objects. Classification and retrieval of 3D models demand that the 3D models represent in a way to capture the local and global shape specifications of the object. This requires establishing a 3D descriptor or signature that summarizes the pivotal shape properties of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012